Zobrazeno 1 - 10
of 146
pro vyhledávání: '"Neal Koblitz"'
Publikováno v:
Journal of Mathematical Cryptology. 16:98-102
Rahman and Shpilrain proposed a Diffie–Hellman style key exchange based on a semidirect product of n × n n\times n -matrices over a finite field. We show that, using public information, an adversary can recover the agreed upon secret key by solvin
Publikováno v:
Advances in Mathematics of Communications.
A seminal 2013 paper by Lyubashevsky, Peikert, and Regev proposed basing post-quantum cryptography on ideal lattices and supported this proposal by giving a polynomial-time security reduction from the approximate Shortest Independent Vectors Problem
Autor:
Neal Koblitz
This introduction to recent work in p-adic analysis and number theory will make accessible to a relatively general audience the efforts of a number of mathematicians over the last five years. After reviewing the basics (the construction of p-adic num
Autor:
Max McDonald, Neal Koblitz
Publikováno v:
The Mathematical Intelligencer. 41:27-34
Autor:
Neal Koblitz, Alfred Menezes
Publikováno v:
Advances in Mathematics of Communications. 13:517-558
We give an overview of our critiques of "proofs" of security and a guide to our papers on the subject that have appeared over the past decade and a half. We also provide numerous additional examples and a few updates and errata.
Autor:
Neal Koblitz, Phan Dương Hiệu
Publikováno v:
Cryptologia
Cryptologia, Taylor & Francis, 2017, 41 (6), pp.491-511. ⟨10.1080/01611194.2017.1292825⟩
Cryptologia, Taylor & Francis, 2017, 41 (6), pp.491-511. ⟨10.1080/01611194.2017.1292825⟩
After Vietnam’s Declaration of Independence on 2 September 1945, the country had to suffer through two long, brutal wars, first against the French and then against the Americans, before finally bec...
Autor:
Neal Koblitz, Alfred Menezes
Publikováno v:
Designs, Codes and Cryptography. 78:87-102
One of the central challenges for mathematical cryptography is to create a payment system that provides the advantages of cash in a digital world. In this expository article we describe two very different solutions to this problem. The first is an el
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319612720
Mycrypt
Mycrypt
How to deal with large tightness gaps in security proofs is a vexing issue in cryptography. Even when analyzing protocols that are of practical importance, leading researchers often fail to treat this question with the seriousness that it deserves. W
Autor:
Neal Koblitz
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319612720
Mycrypt
Mycrypt
The well-known KISS principle of engineering — Keep It Simple, Stupid! — is also of value in cryptography. In certain subfields, such as lattice-based crypto and indistinguishability obfuscation, the proposed constructions pay little heed to the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::67283979df01623ba7c3ce8860904bff
https://doi.org/10.1007/978-3-319-61273-7_2
https://doi.org/10.1007/978-3-319-61273-7_2
Autor:
Neal Koblitz, Alfred Menezes
Publikováno v:
Journal of Mathematical Cryptology, Vol 7, Iss 3, Pp 225-251 (2013)
HMAC is the most widely-deployed cryptographic-hash-function-based message authentication code. First, we describe a security issue that arises because of inconsistencies in the standards and the published literature regarding keylength. We prove a s